Why Use This
This skill provides specialized capabilities for jeremylongshore's codebase.
Use Cases
- Developing new features in the jeremylongshore repository
- Refactoring existing code to follow jeremylongshore standards
- Understanding and working with jeremylongshore's codebase structure
Skill Snapshot
Auto scan of skill assets. Informational only.
Valid SKILL.md
Checks against SKILL.md specification
Source & Community
Updated At Jan 11, 2026, 10:30 PM
Skill Stats
SKILL.md 55 Lines
Total Files 1
Total Size 0 B
License MIT
---
name: "cursor-privacy-settings"
description: |
Configure Cursor privacy and data handling settings. Triggers on "cursor privacy",
"cursor data", "cursor security", "privacy mode", "cursor telemetry". Use when working with cursor privacy settings functionality. Trigger with phrases like "cursor privacy settings", "cursor settings", "cursor".
allowed-tools: "Read, Write, Edit, Bash(cmd:*)"
version: 1.0.0
license: MIT
author: "Jeremy Longshore <jeremy@intentsolutions.io>"
---
# Cursor Privacy Settings
## Overview
This skill helps configure Cursor privacy and data handling settings. It covers privacy mode configuration, sensitive file exclusion, telemetry settings, and enterprise security controls to ensure your code and data are protected appropriately.
## Prerequisites
- Cursor IDE with admin access to settings
- Understanding of data handling requirements
- Knowledge of sensitive files in project
- Compliance requirements documented
## Instructions
1. Evaluate privacy mode needs (per project/globally)
2. Configure .cursorignore for sensitive files
3. Set up environment variables for secrets
4. Configure telemetry settings
5. Verify API key security
6. Document data handling policies
## Output
- Privacy Mode configured appropriately
- Sensitive files excluded from AI context
- Secure API key management
- Telemetry settings aligned with policy
- Documented privacy configuration
## Error Handling
See `{baseDir}/references/errors.md` for comprehensive error handling.
## Examples
See `{baseDir}/references/examples.md` for detailed examples.
## Resources
- [Cursor Privacy Policy](https://cursor.com/privacy)
- [Data Handling Documentation](https://cursor.com/docs/privacy)
- [Security Best Practices](https://cursor.com/security)